botherder / ntapLinks
Transparent network tap
☆122Updated 10 years ago
Alternatives and similar repositories for ntap
Users that are interested in ntap are comparing it to the libraries listed below
Sorting:
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- Repo for autosnort scripts.☆156Updated 5 years ago
- Rogue AP killer☆92Updated 8 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- a Malware/Threat Analyst Desktop☆89Updated 10 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆159Updated 5 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115Updated 9 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 8 years ago
- Docker container for MISP☆96Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 10 years ago
- Enrich a host with open source security information☆27Updated 10 years ago
- Transforms for the AlienVault OTX service☆39Updated 9 years ago
- ☆208Updated 7 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆144Updated 7 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆148Updated 3 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 10 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Updated 8 years ago
- Get your APT on using social media as a tool for data exfiltration.☆149Updated 3 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago